Contents

DynaWeb is a collection of anti-censorship services provided by Dynamic Internet Technology Inc. (DIT). DynaWeb is a web-based anti-censorship portal. Once users point their web browser at one of the DynaWeb URLs, a web page will be presented similar to the original, with most blocked websites as links. In addition, a user can type in any URL in the box on this page and DynaWeb will fetch the pages for him or her instantly. No software is needed, nor are any settings tweaked on a user’s computer. Since the Chinese net police watch DynaWeb’s portal websites closely and block them as soon as they identify them, DynaWeb must be dynamic. It has hundreds of mirror sites at any time, and each with a varying IP and DNS domain names to defeat IP blocking and DNS hijacking. On the backend, DynaWeb also has mechanisms to proactively monitor the blocking status of each of its mirror sites, and as soon as blocking is detected, it will change the IP and DNS domain name instantly.[2]

To keep users connected to such a dynamic infrastructure, DynaWeb has a variety of channels to keep users updated. For example, a user can send a message to one of DynaWeb’s instant messenger (IM) accounts, and will get an instant reply showing the newest addresses of DynaWeb portals. Similar things are being done with emails. By these many, dynamic channels, DynaWeb outsmarts any attempt to collect all DynaWeb addresses by the censors, because each user receives only a (different) subset of DynaWeb’s addresses. Automatic blocking detection combined with quick reaction apparently frustrates the blocking efforts on the China side of the Great Firewall of China (GFW).[2]

DIT also releases a tiny piece of software, FreeGate, which directly taps into DynaWeb’s backbone and keeps a user connected to the dynamic channels automatically. There are indications that FreeGate has some capabilities built-in to exploit some zero-day vulnerabilities of the GFW.[2]

Today DynaWeb offers the widest range of options for users to access Internet freely, and supports more than 50 million web hits per day on average from Chinese users alone.[2]

DIT was founded in 2001 to provide email delivery services to China for U.S. government agencies and NGOs. In 2002, DIT started to provide anti-censorship services under the framework of DynaWeb, and like UltraSurf, DynaWeb became a top contender of the GFW-penetration effort.[2]

In 2004, the Financial Times, citing a member of staff at Symantec in mainland China, reported that Norton AntiVirus identified Freegate as a Trojan horse. There were initial fears that the reports may be a ploy by the Chinese Communist Party (CCP) authorities to encourage removal of the software from computers,[13] but it was soon delisted as a threat. Symantec explained that its detection was based on the software operating similarly to various Trojan horses, based on the use of proxies to penetrate firewalls used to block web sites, but that it had modified its detection to exclude Freegate.[1]

In 2013, it was reported that 'pro-government electronic actors' in Syria sent electronic messages to rebels encouraging them to download a file named Freegate which was claimed to be designed to help dissidents circumvent state surveillance agencies, but actually it was a malware and the intruder was able to monitor what the victim was typing on their computer, and read or remove the victim's files.[14]

In August 2013 while Freegate was testing a new proxy program, some people thought it was a phishing attack. Reports from Iran said the users who used Freegate to pass Internet censorship in Iran, were led to a fake page instead of Facebook's main website. Freegate published a note saying they were testing a new proxy program, and the fake Facebook page was a tunnel. Although IT experts warned users to be careful with the tunnel link because it doesn't use SSL security so users' information is not encrypted.[15]

Tor (anonymity network) – a free product sponsored by the Tor Project that implements onion routing where web connections are repeatedly encrypted and then sent through several proxies making tracing more difficult.